Blog 2 Unit - 4/ Chapter 6 - Societal Impact ( Continued..... )
Today's Reading & Understanding Objectives will be -
* data protection methods, laws (both UN and Indian)
* GDPR, ITA-2000 / 2008
* Data Access Rights
* Ethical Concerns
* E-waste
* Ergonomic Practices
4. Data Protection / Information Privacy / Data Privacy
Data protection is the process of safeguarding important information from corruption, compromise or loss. The importance of data protection increases as the amount of data created and stored continues to grow at unprecedented rates and is also known as Information privacy data privacy.
All companies have data, such as personnel files, customer data, product information, financial transactions, etc.
Decisions management makes are based on this data as are the work processes followed by employees to deliver quality products and services.
Data is one of the most important assets a company has.
For that reason alone, data protection should be a top priority for any company. This includes guarding the availability of the data to employees who need it, the integrity of the data (keeping it correct and up-to-date) and the confidentiality of the data (the assurance that it is available only to people who are authorized).
What can we do to protect ourselves?
We all know the security basics, but they only help if you remain vigilant:
· Use security software on your devices to protect yourself from the latest threats.
· Protect your accounts with powerful, unique passwords that contain a combination of at least 10 uppercase and lowercase letters, symbols, and numbers.
. Don’t write them down, not even in a password protected file, but use a good password manager.
· Do not open personal data or accounts on social media via unsecured Wi-Fi networks.
· Use a spam filter, to filter the most obvious unsolicited e-mail. Note that the filters are not perfect.
· Think carefully before you (don't) click on random links or open unsolicited messages and attachments. Often you can see where links lead to by hovering your mouse over the link, without clicking it.
To minimize your online profile, you should never enter any personal information in a web form which is not relevant for your purpose. If you order something on the internet that must be delivered, the supplier needs to know your address details and transfer that to a courier service.
They need your credit card details or bank account number to check payment. If they ask for more personal information, you have a right to ask why. Just call them. If you do not get a convincing answer, or if you cannot reach them during office hours, you do not want to trust them with your personal data or your money. By Sir Leo Besemer
Differences between Data Security and Data Privacy
Data privacy is a part of Data Security and is related to the proper handling of data – how you collect it, how you use it, and maintaining compliance.
Data Security is about access and protecting data from unauthorised users through different forms of encryption, key management, and authentication.
Data security means protecting digital data, such as those in a database, from destructive forces and from the unwanted actions of unauthorized users, such as a cyberattack or a data breach.
Data security refers to the process of protecting data from unauthorized access and data corruption throughout its lifecycle.
Information privacy law or data protection law prohibit the disclosure or misuse of information about private individuals.
There should be mechanisms for individuals to review data about them, to ensure accuracy.
This may include periodic reporting.
This may include periodic reporting.
Data Principal means the natural person to whom the personal data relates to.
Data Processor means any person, including the State, a company, any juristic entity or any individual who processes personal data on behalf of a data fiduciary, but does not include an employee of the data fiduciary.
GDPR
The General Data Protection Regulation (EU) 2016/679 (GDPR) is a regulation in EU law on data protection and privacy in the European Union (EU) and the European Economic Area (EEA).
It also addresses the transfer of personal data outside the EU and EEA areas. The GDPR aims primarily to give control to individuals over their personal data and to simplify the regulatory environment for international business by unifying the regulation within the EU.
Controllers and processors of personal data must put in place appropriate technical and organizational measures to implement the data protection principles. Business processes that handle personal data must be designed and built with consideration of the principles and provide safeguards to protect data
To know about the regulations and principles under GDPR please Click Me or visit the URL ----------------- > https://gdpr-info.eu
Data Protection Law in India
(Screen shot taken on April 23, 2020)
In the Information Technology Act, 2008 Section 43 – the code for data protection is --
Just for your information that in India the IT Act was introduced in 2000 Click Me or visit the site https://www.meity.gov.in/content/information-technology-act-2000
As on Sept 2022
https://eprocure.gov.in/cppp/rulesandprocs/kbadqkdlcswfjdelrquehwuxcfmijmuixngudufgbuubgubfugbububjxcgfvsbdihbgfGhdfgFHytyhRtMjk4NzY=
5. Ethical Concerns/Issues/Challenges with respect to IT
The new world of information society with global networks and cyberspace has been inevitably generating a wide variety of social, political, and ethical problems. Many problems related to human relationships and the community become apparent, when most human activities are carried on in cyberspace.
Some basic ethical issues on the use of IT on global networks consist of
Personal privacy
Data access rights, and
Harmful actions on the Internet
Ethical Challenges on Information Technology
Security: With tools like the internet, hackers have found it very easy to hack into any computer or system as long as it is connected on internet.
Hackers can easily use an IP (Internet Protocol) address to access a user’s computer and collect data for selfish reasons. Also the wide spread of internet cookies which collect information whenever we use the internet.
Plagiarism is where the work of others is copied, but the author presents it as his or her own work. This is a highly unethical practice, but happens quite frequently, and with all the information that is now available on the Internet it is much easier to do and is happening more often.
My Practices - I surf various sites to make my Blog
When I use and image or a video for my notes they fall under either of the two categories - Most of them are free of copyright (Public Domain) and one was copyrighted and then I visited the owner website and attributed to the image with easy steps. (Like the purpose and how I will be using it)
ClickMe or visit the site to know about how to use content of others
In order to know about the legal terms for each of the below mentioned terms with respect to use of other's work Click Me or visit the site http://www.dmlp.org/legal-guide/intellectual-property
Intellectual Property Rights is a category of property right that reserves rights to intangible creations of the human intellect. There are many types of intellectual property, and some countries recognize more than others. The most well-known types are copyrights, patents, trademarks, and trade secrets.
Copyright Infringement:
Information technology has made it easy for users to access any information or artefact at any given time without giving the credibility to the original creator. With the increased development of music sharing networks and photo bookmarking sites, many original creators of these works are losing the credibility of their works, because users of IT can easily gain access and share that data with friends. Free music and file downloading sites are popping up on internet every day , lots of original work like music albums, books , are being downloaded for free.
Information technology has made it easy for users to access any information or artefact at any given time without giving the credibility to the original creator. With the increased development of music sharing networks and photo bookmarking sites, many original creators of these works are losing the credibility of their works, because users of IT can easily gain access and share that data with friends. Free music and file downloading sites are popping up on internet every day , lots of original work like music albums, books , are being downloaded for free.
Patent is a form of intellectual property that gives its owner the legal right to exclude others from making, using, selling and importing an invention for a limited period of years, in exchange for publishing an enabling public disclosure of the invention.
Trademarks is a type of intellectual property consisting of a recognizable sign, design, or expression which identifies products or services of a particular source from those of others, although trademarks used to identify services are usually called service marks.
Trade secret is any practice or process of a company that is generally not known outside of the company. Information considered a trade secret gives the company an economic advantage over its competitors and is often a product of internal research and development.
To know about the Indian Trademark System you may click Indian Controller General of Patent or visit the site http://www.ipindia.nic.in/trade-marks.htm
Copyright | Patents | Trademark | |
---|---|---|---|
What’s Protected? | Original works of authorship, such as books, articles, songs, photographs, sculptures, choreography, sound recordings, motion pictures, and other works | Inventions, such as processes, machines, manufactures, compositions of matter as well as improvements to these | Any word, phrase, symbol, and/or design that identifies and distinguishes the source of the goods of one party from those of others |
Requirements to be Protected | A work must be original, creative and fixed in a tangible medium | An invention must be new, useful and nonobvious | A mark must be distinctive (i.e., that is, it must be capable of identifying the source of a particular good) |
Term of Protection | Author’s life plus 70 more years. | 20 years | For as long as the mark is used in commerce |
Rights Granted | Right to control the reproduction, making of derivative works, distribution and public performance and display of the copyrighted works | Right to prevent others from making, selling using or importing the patented invention | Right to use the mark and to prevent others from using similar marks in a way that would cause a likelihood-of-confusion about the origin of the goods or services. |
Licensing is defined as a business arrangement, wherein a company authorizes another company by issuing a license to temporarily access its intellectual property rights, i.e. manufacturing process, brand name, copyright, trademark, patent, technology, trade secret, etc. for adequate consideration and under specified conditions.
For Example - Toy manufacturers also routinely sign licensing agreements with movie studios, giving them the legal authority to produce action figures based on popular likenesses of movie characters.
CC Licensing GNU GPL Licensing
Creative Commons Licenses are a set of copyright licenses that give the recipients, rights to copy, modify and redistribute the creative material, but giving the authors, the liberty to decide the conditions of licensing. Creative Commons licenses are for all kinds of creative works: websites, scholarship, music, film, photography, literature, courseware, etc. | It is the most widely used free software license which grants the recipients, rights to copy, modify and redistribute the software and to ensure that the same rights were preserved in all derivative works Primarily designed for software. One popular example of a GPL-licensed work is WordPress. |
Piracy - the illegal copying of software, and then further distributing it, is a very serious problem, and it is estimated that approximately 50% of all programs on PCs are pirated copies.
File Sharing - One file is when shared illegally with many users with no cost is called File Sharing. College students have been at the leading edge of the growing awareness of the centrality of intellectual property in a digital age. When American college student Shawn Fanning invented Napster in 1999, he set in motion an ongoing legal battle over digital rights. Napster was a file-sharing system that allowed users to share electronic copies of music online. The problem was obvious: recording companies were losing revenues as one legal copy of a song was shared among many people.
A hacker is an individual who is knowledgeable enough to gain access without authorization to computer systems to identify security flaws. Hackers break into, or ‘hack’ into a system. Hacking can be undertaken for a variety of reasons, such as the wish to damage a system or the wish to understand how a system works, so that money can be made out of it. Alternatively, there might be a desire to alert people to the fact that a system is insecure and needs improving.
Malicious code attacks include a number of types of computer programs that are created with the intention of causing data loss or damage. The three main types of malicious code attacks are viruses, Trojan horses, and worms.
A virus is malicious software that is attached to another program to execute a particular unwanted function on a workstation. An example is a program that is attached to command.com (the primary interpreter for Windows systems) and deletes certain files and infects any other versions of command.com that it can find.
A Trojan horse is different only in that the entire application is written to look like something else, when in fact it is an attack tool. An example of a Trojan horse is a software application that runs a simple game on a workstation.
6. Cybercrime and Cyber Laws
What is the meaning of the word ‘Cyber’?
The origin of the word Cyber is – ‘Cybernetics’, which is derived from the Greek word kubernÄ“tÄ“s which refers to a pilot or steersman. Related is the Greek word kubernÄ“sis which means “the gift of governance” and applies to leadership.
Cyberspace refers to the virtual computer world, and more specifically, is an electronic medium used to form a global computer network to facilitate online communication.
Cyberattack or Cybercrime is a malicious and deliberate attempt by an individual or organization to breach the information system of another individual or organization. Usually, the attacker seeks some type of benefit from disrupting the victim’s network.
Why Cybercrime?
Cybercrime has increased every year as people try to benefit from vulnerable business systems. Often, attackers are looking for ransom: 53 percent of cyberattacks resulted in damages of $800,000 or more.
Cyberthreats can also be launched with ulterior motives. Some attackers look to obliterate systems and data as a form of “hacktivism.”
Cyberwarfare is the use of technology to attack a nation, causing comparable harm to actual warfare. There is significant debate among experts regarding the definition of cyberwarfare, and even if such a thing exists.
Common types of Cyberattacks / Cyber crimes
Malware is a term used to describe malicious software, including spyware, ransomware, viruses, and worms. Malware breaches a network through a vulnerability, typically when a user clicks a dangerous link or email attachment that then installs risky software. Once inside the system, malware can do the following:
· Blocks access to key components of the network (ransomware)
· Installs malware or additional harmful software
· Covertly obtains information by transmitting data from the hard drive (spyware)
· Disrupts certain components and renders the system inoperable
Phishing is the practice of sending fraudulent communications that appear to come from a reputable source, usually through email. The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine. Phishing is an increasingly common cyberthreat.
Man-in-the-middle (MitM) attacks, also known as eavesdropping attacks, occur when attackers insert themselves into a two-party transaction. Once the attackers interrupt the traffic, they can filter and steal data.
Two common points of entry for MitM attacks:
1. On unsecure public Wi-Fi, attackers can insert themselves between a visitor’s device and the network. Without knowing, the visitor passes all information through the attacker.
2. Once malware has breached a device, an attacker can install software to process all of the
victim’s information.
Denial-of-Service (DoS) attack floods systems, servers, or networks with traffic to exhaust resources and bandwidth. As a result, the system is unable to fulfil legitimate requests. Attackers can also use
multiple compromised devices to launch this attack. This is known as a distributed-denial-of-service (DDoS) attack.
** Botnet - a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g. to send spam.
Structured Query Language (SQL) injection occurs when an attacker inserts malicious code into a server that uses SQL and forces the server to reveal information it normally would not. An attacker could carry out a SQL injection simply by submitting malicious code into a vulnerable website search box.
A zero-day exploit hits after a network vulnerability is announced but before a patch or solution is implemented. Attackers target the disclosed vulnerability during this window of time.
DNS Tunnelling - for malicious use, DNS requests (converting URL to IP equivalent) are manipulated (simply redirect you to the attacker's DNS server or will overload your server) to exfiltrate data (exchange information) from a compromised system(user / victim who has requested a url) to the attacker’s infrastructure. It can also be used for command and control call backs from the attacker’s infrastructure to a compromised system which poses a serious problem today. A new breed of haves’ and ‘have nots’ are being created, between those that have access and can use a computer and the Internet, and those that do not have such access. There are clearly serious ethical implications here. Those that do not have such access may well be discriminated against, feel ‘socially excluded’ and miss out on many life opportunities.
Click to watch --> Internal working of DNS or visit the link --> https://www.youtube.com/watch?v=mpQZVYPuDGU
Unwarranted Mass-Surveillance – is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organisations.
Mass surveillance has often been cited as necessary to fight terrorism, prevent crime and social unrest, protect national security, and control the population. Conversely, mass surveillance has equally often been criticized for violating privacy rights, limiting civil and political rights and freedoms, and being illegal under some legal or constitutional systems. Another criticism is that increasing mass surveillance could lead to the development of a surveillance state or an electronic police state where civil liberties are infringed or political dissent is undermined
Sextortion - Sextortion refers to a form of blackmail in which sexual information or images are used to extort sexual favors from the victim. Social media and text messages are often the source of the sexual material and the threatened means of sharing it with others.
Child Pornography - Pornography (often shortened to porn) is the portrayal of sexual subject matter for the exclusive purpose of sexual arousal by exploiting children for sexual stimulation.
It may be produced with the direct involvement or sexual assault of a child also known as child sexual abuse images or it may be simulated child pornography.
Please visit the site to know the Acts introduced in ITA-2000 as per the information support from National Commission for Protection of Child Rights (NCPCR) or Click Me
Cyber-bullying or Cyber-harassment is a form of bullying or harassment using electronic means. Cyberbullying and Cyberharassment are also known as online bullying. It has become increasingly common, especially among teenagers, as the digital sphere has expanded and technology has advanced.
The most common places where cyberbullying occurs are:
- Social Media, such as Facebook, Instagram, Snapchat, and Twitter
- SMS (Short Message Service) also known as Text Message sent through devices
- Instant Message (via devices, email provider services, apps, and social media messaging features)
- Email
Effects of Cyberbullying
Cyberbullying usually has long-term detrimental effects on a victim. Truancy is quite common when a victim is continually bullied both in-person and through technology. Also, their grades may suffer, their self-esteem is hurt, depression can set in, they may have increased health-related issues, abuse of alcohol and/or drugs may begin, and many more negative effects can occur, depending on the child.
Some individuals groom children in hopes of initiating sexual contact with them. Grooming Child usually happens in children with lower self-esteem and those children who have issues of loneliness or isolation. In these instances, a targeted cyberbullying campaign can also be a tool for a predator.
Check the Indian Government website to know all about Cyberbullying https://www.stopbullying.gov/cyberbullying/what-is-it or Click Me
FOSS
Acronym for Free or Open Source Software. FOSS programs are those that have licenses that allow users to freely run the program for any purpose, modify the program as they want, and also to freely distribute copies of either the original version or their own modified version.
So in the most common way of thinking, where "free" means no upfront cost to use, modify the source code , or distribute, the answer is yes: the software is free in terms of its Source Code ... Open source software rarely comes with the technical support and warranty services that proprietary software provides.
The distribution terms of open-source software must comply with the following criteria:
1. Free Redistribution - The license shall not require a royalty or other fee for such sale.
2. Source Code - The program must include source code, and must allow distribution in source code as well as compiled form. The source code must be the preferred form in which a programmer would modify the program.
3. Derived Works - The license must allow modifications and derived works and then distribution.
4. Integrity of The Author's Source Code - The license may require derived works to carry a different name or version number from the original software.
5. No Discrimination Against Persons or Groups - The license must not discriminate against any person or group of persons.
6. No Discrimination Against Fields of Endeavour - The license may not restrict the program from being used in a business, or from being used for genetic research.
7. Distribution of License - The rights attached to the program must apply to all to whom the program is redistributed without the need for execution of an additional license by those parties.
8. License Must Not Be Specific to a Product - All parties to whom the program is redistributed should have the same rights as those that are granted in conjunction with the original software distribution.
9. License Must Not Restrict Other Software - The license must not insist that all other programs distributed on the same medium must be open-source software.
10. License Must Be Technology-Neutral No provision of the license may be predicated on any individual technology or style of interface.
E-waste
Electronic waste or e-waste, is a term for electronic products that have become unwanted, non-working or obsolete, and have essentially reached the end of their useful life. Because technology advances at such a high rate, many electronic devices become “trash” after a few short years of use.
Waste electrical and electronic equipment (WEEE) is becoming major threat to the whole world
Sources of E-waste
In fact, whole categories of old electronic and electric items contribute to e-waste such as VCRs being replaced by DVD players, and DVD players being replaced by blu-ray players. E-waste is created from anything electronic scrap components, such as CPUs, contain potentially harmful components such as lead, cadmium, beryllium, or brominated flame retardants, TVs, monitors, cell phones, PDAs, VCRs, CD players, fax machines, printers, refrigerator, cooler, air conditioners etc.
Forms of E-waste
Flame retardants include Polybrominated diphenyl ethers (PBDEs) are flame retardant additives widely used in plastic casings of electronic equipment’s and as foams.
Triphenyl phosphates(TPP) used as flame retardants and plasticisers in photocopy films and found in hydraulic fluids and oils TPP also found in plastic covering of monitors.
Heavy metals includes Lead, which is used in electrical solder, batteries, commonly used as alloy with tin, in cathode ray tube lead oxide is used in the glass, used as stabilisers in formulation of PVC.
Cadmium compounds are used in contacts, switches, solder joints, in rechargeable batteries, as stabilisers in formulation of PVC.
Cadmium sulphide are used in interior surface of the CRT screens to produce illumination.
Antimony is used in semiconductors, flame retardant formulations in plastics also used in lead acid starter batteries and electrical solders.
Mercury is found in printed circuit boards, relays and switches, chromium is used as corrosion protectant in galvanized steel parts.
Barium is found in CRT monitors.
Beryllium is commonly found in circuit mother boards.
Free Carbon radicles from toners of printers also another form of e-waste.
Impact on Human Health
Chlorobenzene causes acute and chronic effects in mammals, effects CNS (central nervous system), liver and thyroid.
Heavy metals such as lead may produce irreversible effects; it affects nervous system, blood, reproductive system and kidneys, it affects brain development in children.
Cadmium is a toxicant which can accumulates in tissues, exposure may affect kidneys and bones
Mercury results in respiratory and skin disorders and causing chronic damage to brain.
Chromium is a known carcinogen it affects the DNA and causing asthmatic bronchitis.
Barium causes damage to heart, spleen and liver also causing muscle weakness.
Beryllium is a carcinogen causing lung cancer inhalation also causes chronic disease berylliosis and resulting skin warts.
Free Carbon radicles are carcinogens.
Impact on the Environment
After collecting the metals from the waste the pickers either simply burn the rest as in result the hazardous smoke spreads and causes variety of respiratory and skin diseases or dump the rest in soil which releases dioxins, hydrocarbons and toxic brominated compounds to the soil.
In addition circuit boards are burnt which releases fumes consisting toxic lead, tin and mercury, and toxic irritant isocyanides.
Now the surface water, well waters, underground water are becoming toxic too.
Growing crops, vegetables with toxic water or in the toxic soil also lead to health issues.
It was reported water and soil consist of very high levels of lead.
E-waste Disposal Methods
Landfilling
This is the most common methodology of e-waste disposal. Soil is excavated and trenches are made for burying the e-waste in it. An impervious liner is made of clay or plastic with a leachate basin for collection and transferring the e-waste to the treatment plant. However, landfill is not an environmentally sound process for disposing off the e-waste as toxic substances like cadmium, lead and mercury are released inside the soil and ground water.
Watch --> https://www.youtube.com/watch?v=lsyg472MQp8
Watch --> https://www.youtube.com/watch?v=lsyg472MQp8
Acid Bath
Acid bath involves soaking of the electronic circuits in the powerful sulphuric, hydrochloric or nitric acid solutions that free the metals from the electronic pathways. The recovered metal is used in the manufacturing of other products while the hazardous acid waste finds its ways in the local water sources.
Incineration
This is a controlled way of disposing off the e-waste and it involves combustion of electronic waste at high temperature in specially designed incinerators. This e-waste disposal method is quite advantageous as the waste volume is reduced extremely much and the energy obtained is also utilized separately. However, it is also not free from disadvantages with the emission of the harmful gases mercury and cadmium in the environment.
Recycling of E-Waste
Mobile phones, monitors, CPUs, floppy drives, laptops, keyboards, cables and connecting wires can be re-utilized with the help of the recycling process. It involves dismantling of the electronic device, separation of the parts having hazardous substances like CRT, printed circuit boards etc. and then recovery of the precious metals like copper, gold or lead can be done with the help of the efficient a powerful e-waste recycler. The most crucial thing here is choosing the right kind of recycler that does not break laws and handle the e-waste in the eco-friendly manner.
Reuse of Electronic Devices
This is the most desirable e-waste recycling process where with slight modifications the mobile phones, computers, laptops, printers can be reused or given as second hand product to the other person. The old electronic equipment can also be donated in the various charity programs and thus helping the persons in need. Moreover, there is a better way also by selling the old mobile phones or laptops to the some recycling and refurbishing companies. Several websites are acting as the middleman between recyclers and electronic users. It is a win-win situation for the users as they not only get rid-off the old mobile phones but also get paid after reselling it.
Solution to E-waste
Generally, solutions to the global e-waste problem involve awareness raising among both consumers and e-waste recyclers in the informal economy, integration of the informal sector with the formal, creating green jobs, enforcing legislation and labour standards, and eliminating practices which are harmful to human health and the environment.
E-waste Management
Consumers and manufacturers are the key to better management of e-waste.
Initiatives such as
· Extended Producer Responsibility (EPR)
· Design for Environment (DfE)
· Reduce, Reuse, Recycle (3Rs)
technology platform for linking the market facilitating a circular economy aim to encourage consumers to correctly dispose their e-waste, with increased reuse and recycling rates, and adopt sustainable consumer habits.
In developed countries, e-waste management is given high priority, while in developing countries it is exacerbated by completely adopting or replicating the e-waste management of developed countries and several related problems including, lack of investment and technically skilled human resources.
In addition, there is lack of infrastructure and absence of appropriate legislations specifically dealing with e-waste. Also, there is inadequate description of the roles and responsibilities of stakeholders and institutions involved in e-waste management, etc.
E-waste Management in India
In 2016, the Ministry of Environment, Forest and Climate Change (MoEFCC) released the updated E-waste (Management) Rules, which came in supersession of the E-waste in India (GOI, 2016).
To see the rules please visit http://greene.gov.in/wp-content/uploads/2018/01/EWM-Rules-2016-english-23.03.2016.pdf
Summary of the Rules GOI, 2016
· The producers/ manufacturers / distributors / refurbisher of the electric and electronic equipment need to collect back the equipment after the life expiry of the equipment.
· Reduction in the use of hazardous substances in the manufacture of electrical and electronic equipment, promoting green product production.
· The collection, storage, transportation, segregation, refurbishment, dismantling, recycling and disposal of e-waste shall be in accordance with the procedures prescribed in the guidelines published by the Central Pollution Control Board from time to time.
· Urban Local Bodies (Municipal Committee or Council or Corporation) shall ensure that e-waste pertaining to orphan products is collected and channelised to authorised dismantler or recycler
List of Authorities Under GOI, 2016
1. Central Pollution Control Board, Delhi Responsibilities
Grant and Renewal of Extended Producer Responsibility
(i) Authorisation and monitoring of its compliance.
(ii) Maintain information on Extended Producer Responsibility - Authorisation on its web site.
(iii) Set and revise targets for collection of e-waste from time to time.
(iv) Coordination with State Pollution Control Boards
2. State Pollution Control Boards or Responsibilities
Committees of Union territories (i) Authorisation and monitoring of its compliance.
(ii) Maintain information on Extended Producer Responsibility - Authorisation on its web site.
(iii) Set and revise targets for collection of e-waste from time to time.
(iv) Coordination with State Pollution Control Boards
3. Urban Local Bodies (Municipal Responsibilities
Committee or Council (i) To ensure that e-waste if found to be mixed with
or Corporation) Municipal
Solid Waste is properly segregated, collected and is channelised to authorised dismantler or recycler.
(ii) To ensure that e-waste pertaining to orphan products is collected and channelised to authorised dismantler or recycler.
4. Port authority under Indian Ports Responsibilities
Act 1908 (15 of 1908) and (i) Verify the Extended Producer Responsibility -
Customs Authority under the Authorisation.
Customs Act, 1962 (52 of 1962) (ii) Inform Central Pollution Control Board of any illegal
traffic for necessary action.
(iii) Take action against importer for violations under the Indian Ports Act, 1908/Customs Act, 1962.
E-waste Centre Near Me
Resource E Waste Solution Pvt Ltd
Address: 518 FIE PATPARGANJ INDUSTRIAL AREA Near Haridarshan Building, Delhi, 110092
Hazardous Waste Recycling & Disposal Services India Level
Address: 584 GG INDIRAPURAM, Nyay Khand I, Indirapuram, Uttar Pradesh 201014
Thank you!!!